Overview
overview
10Static
static
100383282038...bd.exe
windows7-x64
082060e332...76.exe
windows7-x64
101035f1b289...b8.exe
windows7-x64
624592b8814...b9.exe
windows7-x64
331459fd8f4...d2.exe
windows7-x64
103216f3b1bf...ae.exe
windows7-x64
43026556ea...97.exe
windows7-x64
14499426b05...8b.exe
windows7-x64
779271d57c5...61.exe
windows7-x64
7843cd39e4f...29.exe
windows7-x64
10847001fe67...7e.exe
windows7-x64
1902f0cb92e...ad.exe
windows7-x64
1994d023640...94.dll
windows7-x64
1a006d20ea6...6b.exe
windows7-x64
3aaf476e091...d5.exe
windows7-x64
8abb979296b...f1.dll
windows7-x64
7b630f84b45...86.exe
windows7-x64
1bd37f1c8f1...8e.exe
windows7-x64
1c086172b03...77.exe
windows7-x64
10c2a620243b...bb.exe
windows7-x64
1c3705bab83...3b.exe
windows7-x64
1c97d9bbc80...15.exe
windows7-x64
10cad20feffc...5d.exe
windows7-x64
5d01b92a1d7...c4.dll
windows7-x64
6d2a120aa4a...78.exe
windows7-x64
10d9f7e34bf8...f1.exe
windows7-x64
1da45ff208b...95.exe
windows7-x64
dd0d00fec6...c8.exe
windows7-x64
10e8ae1656c2...dc.exe
windows7-x64
5ed09a02045...0d.exe
windows7-x64
7f0c2927859...a6.exe
windows7-x64
9f3771ca98b...50.exe
windows7-x64
8Analysis
-
max time kernel
201s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26-03-2024 16:54
Behavioral task
behavioral1
Sample
0383282038e4b6b1daa69a9b71bfff42b8091a4004bbe780c98239ada99f77bd.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
082060e3320870d1d576083e0ee65c06a1104913ae866137f8ca45891c059a76.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
1035f1b289e6d88148431da56ed5fb3c3d251b51f38bfd498690537e57a3c8b8.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
24592b881440b004bfcc51692deef734babdfc0cd5719826bd05ae678584bfb9.exe
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
31459fd8f4ca241e9f2eedcaddf848d8be9eaa76f05102b30872eedbe6c250d2.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
3216f3b1bf985c045c18f16e00abcec112149ce8ecad190c620500f5cefb59ae.exe
Resource
win7-20240221-en
Behavioral task
behavioral7
Sample
43026556eaa76df4544dd37cc1f708eb3df18b7e33969042b343c2b8be4ff697.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
4499426b05f7f17b48d3aa805681c53aed09b5b48e25c9070c08dbfae464698b.exe
Resource
win7-20240319-en
Behavioral task
behavioral9
Sample
79271d57c531c79536bc0be0d71e3a372bed9c10689257a7727475ab41e3e161.exe
Resource
win7-20240319-en
Behavioral task
behavioral10
Sample
843cd39e4f5024ef36fdc142bf2eb9d9dcc05f0b8f7f812d49ddac8a2bf83f29.exe
Resource
win7-20240221-en
Behavioral task
behavioral11
Sample
847001fe67b260c91fdc360297f6758598c41eb78fc4aae6adc4a4e2dd813b7e.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
902f0cb92e46d9d3028a9e5b52975f66142648ac90007032aafa9b1e2b5263ad.exe
Resource
win7-20240221-en
Behavioral task
behavioral13
Sample
994d02364001319f2a3fd9318a2f760c79d7dcfddb177940e22cb60765992094.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
a006d20ea64758a5219d6a8833a593d99b47c2301e17be2e07593c1565de086b.exe
Resource
win7-20240221-en
Behavioral task
behavioral15
Sample
aaf476e09142ae0b67a0696e3c5d202cda7081c9365f352cfb82068a80e265d5.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
abb979296b15798893029044f06c97a2e98f4ec044c0c34ac27a0dd6bb0b0ff1.dll
Resource
win7-20240221-en
Behavioral task
behavioral17
Sample
b630f84b4573831a769170ce7efe73a107b7cd457f499d29fbb622db5c717086.exe
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
bd37f1c8f1a0b1333df616db123305e9c138eb3331c1fd66907d4e9df93a4a8e.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
c086172b03dbcdc6a782dfbbbf1b6b7f71551bc0d10e1044fcd3c7e880e83a77.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
c2a620243b8c161336d68aaccbb7972f083b3e8e30e0fcfaaf9413e46bcbf1bb.exe
Resource
win7-20240319-en
Behavioral task
behavioral21
Sample
c3705bab837f5e68ab54a026bf6d23b454f9e6273c919f4d9c43db7c9c37a43b.exe
Resource
win7-20240319-en
Behavioral task
behavioral22
Sample
c97d9bbc80b573bdeeda3812f4d00e5183493dd0d5805e2508728f65977dda15.exe
Resource
win7-20240319-en
Behavioral task
behavioral23
Sample
cad20feffc7b67e394cb667c56211449ccc9c474583e4feacb5c2461dd002c5d.exe
Resource
win7-20240319-en
Behavioral task
behavioral24
Sample
d01b92a1d7e00f34549ee537989890699c7ac34c929ea381a4289e49e2d0e4c4.dll
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
d2a120aa4a8aeb87408828d4e7e0da615cb83e32ca5fccc79eee70bca3ea4d78.exe
Resource
win7-20240220-en
Behavioral task
behavioral26
Sample
d9f7e34bf8a82e137d47849c6397b51a5c127af99c4a843f8f8223687a05daf1.exe
Resource
win7-20240221-en
Behavioral task
behavioral27
Sample
da45ff208be5e193a3da424f6025a3b257dff0c67fab84bd6a9028862fd5cb95.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
dd0d00fec6564d52ad291e8f8a99e981a31ba5fbb623076e8e2864f4591e9bc8.exe
Resource
win7-20240221-en
Behavioral task
behavioral29
Sample
e8ae1656c225e8de8e57983db87738630d70036aae6cf1c2b486084edb4aa4dc.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
ed09a020459f1b059bba72c76cd00520c119903b0f8b9fe316a83ced5d66ad0d.exe
Resource
win7-20240221-en
Behavioral task
behavioral31
Sample
f0c292785905838d08b27bb99ab260b43fd8de580de80017fdaaab3c3d53d8a6.exe
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
f3771ca98b3a07606cda74128da5d4292572919418f3045196ea245ef63e9150.exe
Resource
win7-20240319-en
General
-
Target
31459fd8f4ca241e9f2eedcaddf848d8be9eaa76f05102b30872eedbe6c250d2.exe
-
Size
2.2MB
-
MD5
03d64ab4dcf9d9d0f3f24472d237aee9
-
SHA1
a2894cf1bd5ef7fa1380e9ee3c2bedfb5081f737
-
SHA256
31459fd8f4ca241e9f2eedcaddf848d8be9eaa76f05102b30872eedbe6c250d2
-
SHA512
0451f87f2a91d693b3c2ccb69621f66c62b876185965071ea0998c3f76865fc32471d47fa042fd6aaf1adfbff84119ca4a8bed05389258875d40a3f0cfcf4c23
-
SSDEEP
49152:pySU2VbRPrGNWnTvtchcL6yUw4gZ2oe7yUF30kWc0vNa9:pyW3rE2FHL759caE
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\IQManager\\iqmanager.exe" install-773.exe -
Executes dropped EXE 3 IoCs
pid Process 2976 endpoint.exe 2844 install-773.exe 2804 iqmanager.exe -
Loads dropped DLL 10 IoCs
pid Process 2924 31459fd8f4ca241e9f2eedcaddf848d8be9eaa76f05102b30872eedbe6c250d2.exe 2924 31459fd8f4ca241e9f2eedcaddf848d8be9eaa76f05102b30872eedbe6c250d2.exe 2924 31459fd8f4ca241e9f2eedcaddf848d8be9eaa76f05102b30872eedbe6c250d2.exe 2844 install-773.exe 2844 install-773.exe 2844 install-773.exe 2844 install-773.exe 2844 install-773.exe 2804 iqmanager.exe 2804 iqmanager.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\iqmanager.exe = "C:\\Users\\Admin\\AppData\\Roaming\\IQManager\\iqmanager.exe silent" install-773.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: iqmanager.exe File opened (read-only) \??\O: iqmanager.exe File opened (read-only) \??\T: iqmanager.exe File opened (read-only) \??\U: iqmanager.exe File opened (read-only) \??\Y: iqmanager.exe File opened (read-only) \??\I: iqmanager.exe File opened (read-only) \??\M: iqmanager.exe File opened (read-only) \??\P: iqmanager.exe File opened (read-only) \??\R: iqmanager.exe File opened (read-only) \??\A: iqmanager.exe File opened (read-only) \??\B: iqmanager.exe File opened (read-only) \??\H: iqmanager.exe File opened (read-only) \??\K: iqmanager.exe File opened (read-only) \??\N: iqmanager.exe File opened (read-only) \??\S: iqmanager.exe File opened (read-only) \??\W: iqmanager.exe File opened (read-only) \??\E: iqmanager.exe File opened (read-only) \??\G: iqmanager.exe File opened (read-only) \??\J: iqmanager.exe File opened (read-only) \??\Q: iqmanager.exe File opened (read-only) \??\V: iqmanager.exe File opened (read-only) \??\X: iqmanager.exe File opened (read-only) \??\Z: iqmanager.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 7 IoCs
resource yara_rule behavioral5/files/0x000a000000015f7a-11.dat nsis_installer_2 behavioral5/files/0x000a000000015f7a-14.dat nsis_installer_2 behavioral5/files/0x000a000000015f7a-15.dat nsis_installer_2 behavioral5/files/0x000a000000015f7a-16.dat nsis_installer_2 behavioral5/files/0x000a000000015f7a-17.dat nsis_installer_2 behavioral5/files/0x000a000000015f7a-18.dat nsis_installer_2 behavioral5/files/0x00050000000193ab-33.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2804 iqmanager.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2804 iqmanager.exe 2804 iqmanager.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2804 iqmanager.exe 2804 iqmanager.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2804 iqmanager.exe 2804 iqmanager.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2976 2924 31459fd8f4ca241e9f2eedcaddf848d8be9eaa76f05102b30872eedbe6c250d2.exe 28 PID 2924 wrote to memory of 2976 2924 31459fd8f4ca241e9f2eedcaddf848d8be9eaa76f05102b30872eedbe6c250d2.exe 28 PID 2924 wrote to memory of 2976 2924 31459fd8f4ca241e9f2eedcaddf848d8be9eaa76f05102b30872eedbe6c250d2.exe 28 PID 2924 wrote to memory of 2976 2924 31459fd8f4ca241e9f2eedcaddf848d8be9eaa76f05102b30872eedbe6c250d2.exe 28 PID 2924 wrote to memory of 2844 2924 31459fd8f4ca241e9f2eedcaddf848d8be9eaa76f05102b30872eedbe6c250d2.exe 29 PID 2924 wrote to memory of 2844 2924 31459fd8f4ca241e9f2eedcaddf848d8be9eaa76f05102b30872eedbe6c250d2.exe 29 PID 2924 wrote to memory of 2844 2924 31459fd8f4ca241e9f2eedcaddf848d8be9eaa76f05102b30872eedbe6c250d2.exe 29 PID 2924 wrote to memory of 2844 2924 31459fd8f4ca241e9f2eedcaddf848d8be9eaa76f05102b30872eedbe6c250d2.exe 29 PID 2924 wrote to memory of 2844 2924 31459fd8f4ca241e9f2eedcaddf848d8be9eaa76f05102b30872eedbe6c250d2.exe 29 PID 2924 wrote to memory of 2844 2924 31459fd8f4ca241e9f2eedcaddf848d8be9eaa76f05102b30872eedbe6c250d2.exe 29 PID 2924 wrote to memory of 2844 2924 31459fd8f4ca241e9f2eedcaddf848d8be9eaa76f05102b30872eedbe6c250d2.exe 29 PID 2844 wrote to memory of 2804 2844 install-773.exe 30 PID 2844 wrote to memory of 2804 2844 install-773.exe 30 PID 2844 wrote to memory of 2804 2844 install-773.exe 30 PID 2844 wrote to memory of 2804 2844 install-773.exe 30 PID 2844 wrote to memory of 2804 2844 install-773.exe 30 PID 2844 wrote to memory of 2804 2844 install-773.exe 30 PID 2844 wrote to memory of 2804 2844 install-773.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\31459fd8f4ca241e9f2eedcaddf848d8be9eaa76f05102b30872eedbe6c250d2.exe"C:\Users\Admin\AppData\Local\Temp\31459fd8f4ca241e9f2eedcaddf848d8be9eaa76f05102b30872eedbe6c250d2.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\ endpoint.exe"C:\Users\Admin\AppData\Local\Temp\ endpoint.exe"2⤵
- Executes dropped EXE
PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\ install-773.exe"C:\Users\Admin\AppData\Local\Temp\ install-773.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Roaming\IQManager\iqmanager.exeC:\Users\Admin\AppData\Roaming\IQManager\iqmanager.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2804
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
420KB
MD50b729b84e6e05a84e189d46c7570b4cf
SHA1ed2d4f461adbf53a31a10e49b09304495b84cabd
SHA2564a91ac9dfcf72a265d3dcd8ee8d7b4ec1e1c61d1929590e0461860dd70b8d3f2
SHA512d557f3e5417873c329171366872c885dfec2f95e793d5d3607804482515fdebad4fcf9338b5e21714fbc880bce3a14032d61bae22c6d66ed8fae1198edbf88fd
-
Filesize
863KB
MD50cedf35492927a5c4b7cd77c3c9c4f91
SHA190cfe487e3a0ca714aad09052107198018e4c483
SHA2568c92e2240049f2b8a2364a709fa4b31532ad11c87eee2eccecfbd424b0dbfaa5
SHA51201605686da7b1db6757038f5b505038c3e4f36c14089b58179505f4d1e82f0839ce31eb192c21f471700dba55d80d03ddad9bc79c89e982a708f2d1dcd6e109d
-
Filesize
5KB
MD507085de5f288a4af975301d446b5e33b
SHA11bab1af24546e953ef72b3f91ce1703aa3053da3
SHA2565026f9af6ce420f4c30853758d9b5e1b9f0042ded6026a925ee180aea661e872
SHA5121f8e16f22cd88a8acd47cbfd5cec4e8b496194b350b106b97b4147d42ba959894e920a5535ec022ab57b7977c74b6ec9864e0344bfea5bf2e0df95c60fd29e54
-
Filesize
56B
MD53ae8f209e0341d4dc52b0f4eb7b1decc
SHA19770791194027ad3b13f8ea2d297d8bf84df8ca9
SHA2563eaa412ebcfeccbdf1beedd13a195a218ddaabcca2daeff0478e1e8dbc43d127
SHA512936acdcd6d0e654e6603fb93026ada987c367a35c5549f32a660fc6db564cf696abcdf42b7d1366dbc3bff8bba0a092f64ac3478ac54192ff994da5f04c0d68e
-
Filesize
291KB
MD589b1c8ed36c5b5a4cc89d6bac1d5042e
SHA11efe7b64f14b63304e8ebde42b127a5235cdfec9
SHA256f191a7442c6c04b69d0ba43fa79f37092aa2ec837c944828a502cfa2965d1a08
SHA51274095f394f3fe0293ff4c77e930eada63ed48dbac85bef8bd4d855c0375d37fc2646a9b7e24329430eb6920240f5175d24e12a110343131e44b359622917c529
-
Filesize
477KB
MD55187760567561bd39c55f4512762d816
SHA1cc447b481e61b60f305e588a5338a0167dab55d6
SHA25695c0f249a27fd47f06816bd1e5fa0e6df15bf1e7eb1a764bf5a003bb214e4bfe
SHA512a38080f9aff8f2c170f769cabdee257a940bc7b9670f78913f861278e9a431829a7aa0887a4a62961d16fe06681e5f523bfbda15bfac0ece21abe85d00913138
-
Filesize
1.7MB
MD5702f9b16f1db834f62ce6e4e2cca0712
SHA1bfbe99d3051bcd79d57aaec4fff466684fbf6614
SHA256b9c6da2ac0ae606cff0ef777dd13d4d95086ab3a3c8d6fdd1304430306be30a6
SHA51278ed4eaceccdf1ebdbf2f48634a41cf5abb060fd0967a2688bcfc0be242f093f012f587166b96f00fe1e03657f32582451eb64dd16c1f10097e52bb95f816020
-
Filesize
750KB
MD5f33f20cfc00ec606fc61c230181cb22a
SHA1d461ae8059a8039c65f289aa7a20f84899003dc5
SHA25692de10c39468f361ad3cdd3f7a313113f6da76e385532c3453ede50d580b8fbe
SHA512f6873cae6bad284d430f08d83c7f0956adc270ed852c9b5321e8a39a9fb79988990c53e50787b3199e1ef55dfff6480b01f2e23a07f4dc8cbbfeddda05104630
-
Filesize
350KB
MD5fe0dd32a4042dcc0c8e0516e871930e9
SHA16964c8c337d77cc5159449f232c166e222870304
SHA2560392057da6eef1656f0022e2b14d6f615317d4e6dffaea063d23373e27d2114a
SHA5128e22a82f3567dd32fd386578e4835c58d092e3ba7e3fcbb98922bc6da51fddce1db31187f73945342fdc21b74c0de4aef27b4596a1d28e8a44d42e4adf9330a7
-
Filesize
786KB
MD5724f2af5c69d82311d3bd764b45d4f58
SHA1a5ce551c1755f083c6c1733fa6d115422f89590e
SHA256e3cbb611fad710434bd9937d7205ffd03b4e5f008a51b61a649889271bf1b1ac
SHA512de6e0f11423a57a0e16dc3138e1e22e2c1a6e175a3e5b728b74c861ff0dc46f2a4ad26e013b26a72cf8cb0899863090cf4d5b1da64300c9e41507749cb8b2eb6
-
Filesize
1.5MB
MD5cf8d45a5c6b297b6eb17ad85029c0542
SHA1e858fb3577d67e3de9f3b479d2235983ace53891
SHA2569bc5c9fabf79ef190c4e860318d17a9d1ec976d6c8a12b351e1dc6a368178dfd
SHA51214725042dc0122c2f291f383546ee75fbae33e95bf1f3da7dd51771f029beb232dd0f3a573af7f769dc11325df15cb2d3d3bc150c71336c0e21b41fa437a5454